1.4 Source Code Analysis
1.4.1 SEARCH
Endpoints & URL-matching patterns
grep -Ei 'api' -Ei 'http' -Ei 'https' -Ei 'URI' -Ei 'URL' -R .grep -Eio '(http|https)://[^/"]+' -Eio 'content://[^/"]+' -R .Files & their permissions
grep -Ei 'MODE_WORLD_READABLE' -Ei 'MODE_WORLD_WRITEABLE' -R .grep -Ei 'getCacheDir' -Ei 'getExternalCacheDirs' -R .grep -Ei 'openFileOutput' -Ei 'FileOutputStream' -Ei 'OutputStream' -Ei 'getExternalFilesDir' -R .Database & realms
grep -Ei 'localUserSecretStore' -Ei 'getWriteableDatabase' -Ei 'getReadableDatabase' -R .grep -Ei 'realm' -Ei 'getDefaultInstance' -Ei 'beginTransaction' -Ei -R .grep -Ei 'SQLiteDatabase' -Ei 'insert' -Ei 'query' -Ei 'delete' -Ei 'update' -R .User
grep -Ei 'username' -Ei 'user' -Ei 'pass' -Ei 'passwd' -Ei 'userid' -Ei 'password' -R .grep -Ei '.config' -Ei 'secret' -Ei 'token' -Ei 'login' -Ei 'auth' -R .Logs
Content
Keystore
1.4.2 OPEN SOURCE FILES
1.4.3 INFO
INTERESTING CLASSES
INTERESTING FUNCTIONS
1.4.4 THINGS TO REPORT
Cleartext credentials (includes base64 encoded or weak encrypted ones)
Credentials cracked (brute-force, guessing, decrypted with stored cryptographic-key, a.s.o...)
File permission MODE_WORLD_READABLE / MODE_WORLD_WRITEABLE (other apps/users are able to read/write)
If http is in use (no SSL)
Anything that shouldn't be there (debug info, comments with info disclosure, ...)
Last updated
Was this helpful?